Developing RC4 Algorithm Using S-Box of Advanced Encryption Standard Cipher

RC4 stream cipher is one of the most significant symmetric cryptosystems, it is simple and used in many commercial products. RC4 uses dynamic permutations and avoids using Linear Feed Back Shift Register (LFSR). It has many weaknesses, such as the tendency in the generated key stream that some key bytes are biased toward different values. This paper presents a new algorithm using S-box of Advanced Encryption Standard (AES) to solve the correlation between public known outputs of the internal state. The state table is filled from S-box values and additional swapping operations are used. The analysis of the proposed algorithm over variable key length produces key byte streams that have no single and double bias. This paper obtains a new algorithm that combines the efficiency of the RC4 and robustness of AES. The results show that the sequences that are generated by the developed RC4 are more random than the sequence that was generated by the RC4. Also, the developed algorithm demands little time more than RC4 execution time. Additionally, the developed algorithm is robust against most attacks, such as distinguishing attack and can be used in different protocols such as Secure Sockets Layer (SSL) Protocol, Oracle Secure SQL, and Wired Equivalent Privacy (WEP) Protocol.

[1]  Kenji Yoshigoe,et al.  Previously overlooked bias signatures for RC4 , 2016, 2016 4th International Symposium on Digital Forensic and Security (ISDFS).

[2]  Goutam Paul,et al.  Proving TLS-attack related open biases of RC4 , 2015, IACR Cryptol. ePrint Arch..

[3]  Goutam Paul,et al.  Analysis of RC4 and Proposal of Additional Layers for Better Security Margin , 2008, IACR Cryptol. ePrint Arch..

[4]  Matthew McKague,et al.  Design and Analysis of RC4-like Stream Ciphers , 2005 .

[5]  Matthew J. B. Robshaw,et al.  New Stream Cipher Designs: The eSTREAM Finalists , 2008 .

[6]  Adi Shamir,et al.  A Practical Attack on Broadcast RC4 , 2001, FSE.

[7]  Prashant Krishnamurthy,et al.  Analysis of energy consumption of RC4 and AES algorithms in wireless LANs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[8]  Lae Lae Khine A New Variant of RC4 Stream Cipher , 2009 .

[9]  Stafford E. Tavares,et al.  Cryptanalysis of RC4-like Ciphers , 1998, Selected Areas in Cryptography.

[10]  Kenneth G. Paterson,et al.  On the Security of RC4 in TLS and WPA , 2013 .

[11]  Serge Vaudenay,et al.  Discovery and Exploitation of New Biases in RC4 , 2010, Selected Areas in Cryptography.

[12]  Ron Steinfeld,et al.  Cryptanalysis of RC4(n, m) stream cipher , 2013, SIN.

[13]  Kenji Yoshigoe,et al.  RC4-2S: RC4 Stream Cipher with Two State Tables , 2013, ITCS.

[14]  Bart Preneel,et al.  Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator , 2003, INDOCRYPT.

[15]  Goutam Paul,et al.  New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 , 2008, FSE.

[16]  Scott R. Fluhrer,et al.  Statistical Analysis of the Alleged RC4 Keystream Generator , 2000, FSE.

[17]  Kenji Yoshigoe,et al.  RC4 Stream Cipher with a Random Initial State , 2013, ITCS.